Telecommunication -- Traffic -- Measurement -- Statistical methods. IEEE 802.11 (Standard). Universities and colleges -- Computer networks -- New Hampshire -- Hanover -- Case studies.
The edge of the Internet is increasingly wireless. Enterprises large and small, homeowners, and even whole cities have deployed Wi-Fi networks for their users, and many users never need to--or never bother to--use the wired network. With the advent...
The Border Gateway Protocol (BGP) facilitates communication between parts of the Internet by determining paths by which data can get from one network to any other. Just as IP is used ubiquitously as an addressing scheme, BGP is used ubiquitously...
Functional neuroimaging has confirmed a high degree of localization of function in the cerebral cortex of man. In contrast, microstructural analysis has contributed very little to the topographical characterization of cortical areas. In this work I...
Community health services -- United States -- Evaluation. ; Health care reform -- United States. ; Medical care -- United States -- Evaluation. ; Evidence-based medicine.
Modern distributed systems scatter sensors, storage, and computation throughout the environment. Ideally these devices communicate and share resources, but there is seldom motivation for a device''s owner to yield control to another user. We...
Cytokinins regulate broad aspects of plant growth and development, such as cell division, root and shoot growth, chloroplast development, and leaf senescence. Cytokinins are perceived by a signal transduction pathway that involves receptors,...
2-D and 3-D woven composites are becoming materials of choice for the forming of structural parts for an ever-increasing range of industries from infrastructure to aerospace. Research has shown that for a wide range of structural composites, in...
The advent of hypervisors revolutionized the computing industry in terms of malware prevention and detection, secure virtual machine managers, and cloud resilience. However, this has resulted in a disjointed response to handling known threats...
Cellulase -- Biotechnology. ; Hydrolysis. ; Paper industry -- Technological innovations. ; Biomass energy -- Economic aspects. ; Saccharomyces cerevisiae -- Genetics. ; Enzymes -- Industrial applications.
Paper sludge is the largest solid waste stream produced by pulp and paper industry, and is also an attractive feedstock for emergent technologies based on processing of cellulosic biomass featuring enzymatic hydrolysis. This study focuses on...
The ionosphere is the primary source for heavy ions which are ubiquitous in the terrestrial magnetosphere. Low-altitude energization in the auroral ionosphere results in bulk heating and transverse acceleration of ions, which begin to upwell and/or...
A mobile agent is an autonomous program that can migrate under its own control from machine to machine in a heterogeneous network. In other words, the program can suspend its execution at an arbitrary point, transport itself to another machine, and...
Safety in transportation systems is a global concern with millions of road accidents happening worldwide every year. Despite sophisticated advancement in automotive design and accident serverity reduction technologies, traffic fatalities continue...
Structural control (Engineering). ; Smart structures -- Vibration. ; Strains and stresses -- Computer simulation. ; Automatic control -- Sensitivity. ; Feedback control systems.
This thesis investigates vibration-based damage identification problems in smart structures. Vibration-based damage metrics suffer from small sensitivity of modal properties to damage, thus making it difficult to detect, locate, and determine the...
Wireless communication systems. Computer networks. Routers (Computer networks).
A mesh network is a network of wireless routers that employ multi-hop routing and can be used to provide network access for mobile clients. Mobile mesh networks can be deployed rapidly to provide an alternate communication infrastructure for...
Pervasive computing leads to an increased integration between the real world and the computational world, and many applications in pervasive computing adapt to the user's context, such as the location of the user and relevant devices, the presence...
This thesis considers the two special sensor networks for future sensor network design: mobile sensor networks and hybrid network of sensors and robots. To investigate two types of networks, we abstract two most important aspects that are ingrained...
Clinical medicine -- Practice. ; Medicine -- Practice. ; Group medical practice.
Health care micro-systems are small, organized groups of clinicians and staff working together with a shared clinical purpose to provide care for a defined set of patients. The size of individual micro-systems vary--a micro-system must be large...
Electronic data processing -- Distributed processing. ; Computer network architectures. ; Programming languages (Electronic computers) -- Semantics. ; Database management.
I tackle the problem of naming and sharing resources across administrative boundaries. Conventional systems manifest the hierarchy of typical administrative structure in the structure of their own mechanism. While natural for communication that...
H-NS, an abundant nucleoid associated protein, has a role in silencing the expression of a variety of environmentally regulated genes during growth under nonpermissive conditions. A genetic approach was used to study H-NS regulation of genes in...
Sensor networks are used in many realtime applications for collecting information from monitored environments and objects, such as moving vehicle tracking, battlefield reconnaissance, and habitat monitoring. Sensor networks are often deployed in...
Multimedia systems -- Mathematical models. ; Information storage and retrieval systems. ; Machinery -- Alignment.
This thesis introduces multiple media correlation, a new technology for the automatic alignment of multiple media objects such as text, audio, and video. This research began with the question: what can be learned when multiple multimedia components...
The theory community has worked on Secure Multiparty Computation (SMC) for more than two decades, and has produced many protocols for many settings. One common thread in these works is that the protocols cannot use a Trusted Third Party (TTP), even...
This thesis presents technologies for the design, fabrication, operation, and control of electrostatic MEMS micro-robots. It describes prototype micro-robots, with dimensions of 60 μm by 250 μm by 10 μm, that are capable of controllable...
Quantitative Risk Analysis of Computer Networks (QSRA) addresses the problem of risk opacity of software in networks. It allows risk managers to get a detailed and comprehensive snapshot of the constitutive software on the network, assess its risk...
Computer security has come a long way since the days of the first Internet worm. With the spreading and commercialization of the Internet, the stakes have gotten higher. Viruses existed and spread before most computers were online, but as global...